Patents by Inventor Jason C. Schultz
Jason C. Schultz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11942919Abstract: A strain compensated heterostructure comprising a substrate comprising silicon carbide material; a first epitaxial layer comprising single-crystal aluminum nitride material formed on a top surface of the substrate; a second epitaxial layer formed on the first epitaxial layer opposite the top surface of the substrate, the second epitaxial layer comprising single-crystal scandium aluminum nitride material; and a third epitaxial layer formed on the second epitaxial layer opposite the first epitaxial layer, the third layer comprising single-crystal aluminum nitride material.Type: GrantFiled: January 11, 2021Date of Patent: March 26, 2024Assignee: Raytheon CompanyInventors: John A. Logan, Jason C. Soric, Adam E. Peczalski, Brian D. Schultz, Eduardo M. Chumbes
-
Publication number: 20240079843Abstract: Apparatus and methods for producing ultrashort optical pulses are described. A high-power, solid-state, passively mode-locked laser can be manufactured in a compact module that can be incorporated into a portable instrument. The mode-locked laser can produce sub-50-ps optical pulses at a repetition rates between 200 MHz and 50 MHz, rates suitable for massively parallel data-acquisition. The optical pulses can be used to generate a reference clock signal for synchronizing data-acquisition and signal-processing electronics of the portable instrument.Type: ApplicationFiled: November 8, 2023Publication date: March 7, 2024Applicant: Quantum-Si IncorporatedInventors: Jonathan M. Rothberg, Jason W. Sickler, Lawrence C. West, Faisal R. Ahmad, Paul E. Glenn, Jack Jewell, John Glenn, Jose Camara, Jeremy Christopher Jordan, Todd Rearick, Farshid Ghasemi, Jonathan C. Schultz, Keith G. Fife, Benjamin Cipriany
-
Publication number: 20210073104Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.Type: ApplicationFiled: November 20, 2020Publication date: March 11, 2021Inventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
-
Patent number: 10846195Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.Type: GrantFiled: October 5, 2015Date of Patent: November 24, 2020Assignee: Unisys CorporationInventors: James R Heit, Robert L Bergerson, Jason C Schultz, John A Peters
-
Patent number: 10797950Abstract: Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network switch, wherein the first information includes at least one of a vendor of the network switch, a model of the network switch, and a firmware version of the network switch. Embodiments may further include configuring the processor to monitor the network switch based on processing of the first information.Type: GrantFiled: December 31, 2015Date of Patent: October 6, 2020Assignee: Unisys CorporationInventors: John A Peters, Robert L Bergerson, Jason C Schultz
-
Publication number: 20200295996Abstract: Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network switch, wherein the first information includes at least one of a vendor of the network switch, a model of the network switch, and a firmware version of the network switch. Embodiments may further include configuring the processor to monitor the network switch based on processing of the first information.Type: ApplicationFiled: June 2, 2020Publication date: September 17, 2020Inventors: John A. Peters, Robert L. Bergerson, Jason C. Schultz
-
Patent number: 10498624Abstract: Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the first router. Embodiments may also include identifying a failure in the first router and, in response to identification of the failure in the first router, automatically switching use of the first router and second router by the Linux-based computing system. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the second router after switching the use of the first router and second router by the Linux-based computing system.Type: GrantFiled: October 5, 2015Date of Patent: December 3, 2019Assignee: Unisys CorporationInventors: James R Heit, Robert L Bergerson, Jason C Schultz, John A Peters
-
Patent number: 10447501Abstract: Systems and methods for establishing a VLAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a NIC coupled to the computing system to include a new field which indicates if a VLAN should be created on the NIC port. Embodiments may also include receiving a configuration statement that includes the new field. Embodiments may further include creating a VLAN on an Ethernet computer network or a subinterface on an InfiniBand computer network based on the received configuration statement that includes the new field.Type: GrantFiled: November 24, 2015Date of Patent: October 15, 2019Assignee: Unisys CorporationInventors: Jason C Schultz, James Heit, John A Peters, Robert L Bergerson
-
Patent number: 9912750Abstract: A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack.Type: GrantFiled: July 25, 2014Date of Patent: March 6, 2018Assignee: Unisys CorporationInventors: Jason C Schultz, John A Peters, Robert Bergerson, James R Heit
-
Publication number: 20170195170Abstract: Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network switch, wherein the first information includes at least one of a vendor of the network switch, a model of the network switch, and a firmware version of the network switch. Embodiments may further include configuring the processor to monitor the network switch based on processing of the first information.Type: ApplicationFiled: December 31, 2015Publication date: July 6, 2017Applicant: Unisys CorporationInventors: John A. Peters, Robert L. Bergerson, Jason C. Schultz
-
Publication number: 20170149584Abstract: Systems and methods for establishing a ULAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a MC coupled to the computing system to include a new field which indicates if a VLAN should be created on the NIC port. Embodiments may also include receiving a configuration statement that includes the new field. Embodiments may further include creating a VLAN on an Ethernet computer network or a subinterface on an InfiniBand computer network based on the received configuration statement that includes the new field.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Applicant: Unisys CorporationInventors: Jason C. Schultz, James Heit, John A. Peters, Robert L. Bergerson
-
Publication number: 20170097878Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.Type: ApplicationFiled: October 5, 2015Publication date: April 6, 2017Applicant: UNISYS CORPORATIONInventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
-
Publication number: 20170099267Abstract: A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (PKCS). Compatibility with PKCS #8 format may enable the communications platform to receive and decrypt encrypted private key files from another communications platform.Type: ApplicationFiled: October 1, 2015Publication date: April 6, 2017Applicant: Unisys CorporationInventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
-
Publication number: 20170099206Abstract: Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the first router. Embodiments may also include identifying a failure in the first router and, in response to identification of the failure in the first router, automatically switching use of the first router and second router by the Linux-based computing system. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the second router after switching the use of the first router and second router by the Linux-based computing system.Type: ApplicationFiled: October 5, 2015Publication date: April 6, 2017Applicant: UNISYS CORPORATIONInventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
-
Publication number: 20170046145Abstract: Systems and methods for dynamically installing a program's dependent software modules before program execution are disclosed. Embodiments may include extracting, from a file that includes at least a program to be executed on the computing system and one or more software modules on which the program depends for execution, the one or more software modules on which the program depends for execution. Embodiments may also include installing the one or more software modules on the computing system after the one or more software modules have been extracted. Embodiments may further include loading and executing the program after the one or more software modules have been installed on the computing system.Type: ApplicationFiled: August 13, 2015Publication date: February 16, 2017Applicant: UNISYS CORPORATIONInventors: Jason C. Schultz, John A. Peters, Robert L. Bergerson, James R. Heit
-
Publication number: 20160364222Abstract: A modern application may be installed, loaded, and run in a legacy software environment by installing a stub library with the application. The stub library can include stub symbolic objects that define functions of external shared libraries called by the application. When the application references external shared libraries that are not already present in the legacy software environment, the stub symbolic objects that define the functions being called from the referenced external shared libraries can be copied into the legacy software environment from the stub library, allowing the application to load and run successfully without the real external shared libraries being installed in the environment.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Applicant: Unisys CorporationInventors: Jason C. Schultz, Robert L. Bergerson, John A. Peters
-
Patent number: 9380047Abstract: A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis.Type: GrantFiled: June 19, 2013Date of Patent: June 28, 2016Assignee: Unisys CorporationInventors: Jason C. Schultz, James R. Heit, Robert L. Bergerson
-
Publication number: 20160099945Abstract: The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be processed by a non-emulated interface in the host environment. The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be performed by the non-emulated interface using DNSSEC. DNS resolutions that do not pass the security checks may fail while DNS resolutions that pass the security checks will be returned to the customer.Type: ApplicationFiled: October 7, 2014Publication date: April 7, 2016Applicant: UNISYS CORPORATIONInventors: Susan C Webb, John A Peters, Robert L. Bergerson, Jason C. Schultz
-
Publication number: 20160028819Abstract: A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack.Type: ApplicationFiled: July 25, 2014Publication date: January 28, 2016Applicant: UNISYS CORPORATIONInventors: Jason C. Schultz, John A. Peters, Robert Bergerson, James R. Heit
-
Publication number: 20140380421Abstract: A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis.Type: ApplicationFiled: June 19, 2013Publication date: December 25, 2014Applicant: Unisys CorporationInventors: Jason C. Schultz, James R. Heit, Robert L. Bergerson